<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Sonatus</provider_name><provider_url>https://www.sonatus.com/de/</provider_url><author_name>John Heinlein</author_name><author_url>https://www.sonatus.com/de/blog/author/john-heinleinsonatus-com/</author_url><title>Enhancing Sonatus Foundation for Network Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BZU0Zu4V9d"&gt;&lt;a href="https://www.sonatus.com/de/blog/enhancing-sonatus-foundation-for-network-security/"&gt;Enhancing Sonatus Foundation for Network Security&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.sonatus.com/de/blog/enhancing-sonatus-foundation-for-network-security/embed/#?secret=BZU0Zu4V9d" width="600" height="338" title="&#x201C;Enhancing Sonatus Foundation for Network Security&#x201D; &#x2014; Sonatus" data-secret="BZU0Zu4V9d" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://www.sonatus.com/wp-content/uploads/2025/06/Foundation-Blog-Feature-Image.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>800</thumbnail_height><description>Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.&#xA0;&#xA0;</description></oembed>
